[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSA able to compromise Cisco, Juniper, Huawei switches
The best response I've seen to all this hype and I completely agree with
Scott:
"Do ya think that you wouldn't also notice a drastic increase in outbound
traffic to begin with? It's fun to watch all the hype and things like
that, but to truly sit down and think about what it would actually take
to make something like this happen, especially on a sustained and
"unnoticed" basis, is just asinine.
Perhaps more work should be spent maintaining ones own equipment and
network than debating the chances that the sky may actually be falling or
the NSA hunting your ass down. ;) Just my two cents for the day!
Happy New Year!
Scott Morris, CCIEx4 (R&S/ISP-Dial/Security/Service Provider) #4713, CCDE
#2009::D,
CCNP-Data Center, CCNP-Voice, JNCIE-SP #153, JNCIE-ENT #102, JNCIS-QFX,
CISSP, et al.
IPv6 Gold Certified Engineer, IPv6 Gold Certified Trainer
CCSI #21903, JNCI-SP, JNCI-ENT, JNCI-QFX
swm at emanon.com
Knowledge is power.
Power corrupts.
Study hard and be Eeeeviiiil......"
Jonathan
On Tue, Dec 31, 2013 at 11:16 AM, Warren Bailey <
wbailey at satelliteintelligencegroup.com> wrote:
> +1
>
> NSA states very clearly this is baked in and ?widely deployed?. Either
> Cisco is not very happy with their government overlords today, or they are
> having long meetings at those oversized conference tables trying to figure
> out what to tell everyone. I?m curious about the implications to the US
> DoD STIG?s that are put out, as I?m fairly sure they do not mention there
> is a backdoor that anyone who knows how to knock can access.
>
> My other question is.. How are they identifying unique ASA and PIX? Is
> there a fingerprint mechanism that tells it what?s going on? I?d think
> there would be quite a few admins out there with really weird syslog
> entries??
>
> Randy is right here.. Cisco has some ?splainin to do - we buy these
> devices as ?security appliances?, not NSA rootkit gateways. I hope the .cn
> guys don?t figure out what?s going on here, I?d imagine there are plenty
> of ASA?s in the .gov infrastructures.
>
> //warren
>
> PS - I mentioned .cn specifically because of the Huawei aspect, in
> addition to the fact that it has been widely publicized we are in a ?cyber
> war? with them.
>
> On 12/31/13, 12:07 PM, "Randy Bush" <randy at psg.com> wrote:
>
> >> There's a limit to what can reasonably be called a *product*
> >> vulnerability.
> >
> >right. if the product was wearing a low-cut blouse and a short skirt,
> >it's not.
> >
> >it's weasel words (excuse the idiom). shoveling kitty litter over a big
> >steaming pile.
> >
> >let me insert a second advert for jake's 30c3 preso,
> >https://www.youtube.com/watch?v=b0w36GAyZIA
> >
> >randy
> >
>
>
>
--
Jonathan Greenwood II
CCIE #22744
- References:
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: ckossmey at cisco.com (Clay Kossmeyer)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: randy at psg.com (Randy Bush)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: fw at deneb.enyo.de (Florian Weimer)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: randy at psg.com (Randy Bush)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: wbailey at satelliteintelligencegroup.com (Warren Bailey)